Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secure computer system integrity check

a computer system and integrity check technology, applied in the field of computer system integrity check, can solve the problems of infecting not only application programs but the operating system kernel and low level functionalities, and operation of conventional methods

Active Publication Date: 2013-11-05
TREND MICRO INC
View PDF10 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This patent describes a way to check the integrity of a computer by accessing data from a hardware component and checking it for malicious code. This can be done by sending a command to a secure driver that places the computer in a special mode and reading the data from the hardware component. The data is then encrypted and placed in a separate buffer for further analysis. This process helps to identify any harmful software on a computer and helps to protect against potential security threats.

Problems solved by technology

However, malicious codes have become very sophisticated to the point where they can infect not just application programs but the operating system kernel and low level functionalities as well.
New breeds of malicious codes can thus interfere with the operation of conventional antivirus programs, preventing malicious codes from being detected and removed.
For example, the application program may infer presence of malicious code when the encrypted data does not conform to a particular encryption algorithm or when the data does not appear in the data transfer buffer.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure computer system integrity check
  • Secure computer system integrity check
  • Secure computer system integrity check

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0011]In the present disclosure, numerous specific details are provided, such as examples of apparatus, components, and methods, to provide a thorough understanding of embodiments of the invention. Persons of ordinary skill in the art will recognize, however, that the invention can be practiced without one or more of the specific details. In other instances, well-known details are not shown or described to avoid obscuring aspects of the invention.

[0012]Being computer-related, it can be appreciated that some components disclosed herein may be implemented in hardware, software, or a combination of hardware and software (e.g., firmware). Software components may be in the form of computer-readable program code stored in a computer-readable storage medium, such as memory, mass storage device, or removable storage device. For example, a computer-readable storage medium may comprise computer-readable program code for performing the function of a particular component. Likewise, computer mem...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The integrity of a computer may be checked by issuing a command to read data from a hardware component of the computer and retrieving the data from a data transfer buffer. The command may be sent to a secure driver that places the central processing unit (CPU) of the computer in system management mode to trigger execution of a system management interrupt (SMI) handler. The SMI handler may read the data from the hardware component, encrypt the data, and place the encrypted data in the data transfer buffer. A system integrity check application program may read the encrypted data to determine presence of malicious code based on the data. For example, the application program may infer presence of malicious code when the encrypted data does not conform to a particular encryption algorithm or when the data does not appear in the data transfer buffer.

Description

BACKGROUND OF THE INVENTION[0001]1. Field of the Invention[0002]The present invention relates generally to computer system security, and more particularly but not exclusively to methods and apparatus for checking the system integrity of a computer.[0003]2. Description of the Background Art[0004]Computer viruses, worms, Trojans, rootkits, and spyware are examples of malicious codes that have plagued computer systems throughout the world. In the past, traditional antivirus techniques allow for detection and removal of malicious codes. However, malicious codes have become very sophisticated to the point where they can infect not just application programs but the operating system kernel and low level functionalities as well. New breeds of malicious codes can thus interfere with the operation of conventional antivirus programs, preventing malicious codes from being detected and removed. What is needed is a way to detect malicious codes, especially those that can affect low level operatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/00
CPCG06F21/554G06F21/74G06F2221/2107G06F2221/2105
Inventor LIN, YICHINYUEH, PENG-YUANLIU, YU-HENG
Owner TREND MICRO INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products